Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TCLBANKER Trojan Expands Through WhatsApp and Outlook

TCLBANKER Trojan Expands Through WhatsApp and Outlook

Posted on May 9, 2026 By CWS

A newly identified Brazilian banking trojan, known as TCLBANKER, is making waves in cybersecurity circles due to its sophisticated capabilities. This malware, associated with the REF3076 campaign, has emerged as a significant evolution from the earlier Maverick and SORVEPOTEL families, utilizing advanced techniques to propagate through popular platforms like WhatsApp and Microsoft Outlook.

Advanced Malware Techniques Unveiled

One of the defining features of TCLBANKER is its use of a misleading, signed Logitech installer to breach systems. The attack sequence commences with the download of a malicious ZIP file, which contains an installer masquerading as a legitimate Logitech application, specifically the Logi AI Prompt Builder. This strategy employs DLL side-loading, where the authentic application is tricked into executing a harmful file, setting the stage for further system compromise.

TCLBANKER is adept at evading detection by security researchers. Before fully activating, the malware assesses its environment for signs of a security sandbox, debugging tools, or virtual machines. Additionally, it verifies that the system’s language and time zone align with Brazil, ensuring it targets genuine Brazilian users. If these conditions are unmet, the malware remains dormant, concealed from security scanners.

Targeting Banking and Financial Platforms

Once TCLBANKER identifies a legitimate host system, it deploys its primary banking trojan. This component vigilantly monitors web browsers for visits to 59 specific banking, fintech, or cryptocurrency platforms. Upon detecting a match, it establishes a connection with a remote server to facilitate unauthorized access.

The trojan’s password-stealing capabilities are particularly insidious, deploying full-screen overlays that mimic legitimate banking prompts. These overlays render the user’s screen unresponsive to keyboard shortcuts and disable screenshot tools, compelling users to enter sensitive information directly into the malicious interface.

Self-Propagating Worm Modules

TCLBANKER’s ability to self-propagate elevates its threat level. The malware’s first worm module exploits WhatsApp Web by cloning active sessions without user intervention, sending phishing messages to contacts. This technique leverages trust among users, increasing the likelihood of further infections.

Simultaneously, the malware’s second worm module targets Microsoft Outlook. By commandeering the email platform, it harvests contacts and dispatches phishing emails from the victim’s account, bypassing many email security mechanisms due to the use of legitimate credentials.

Both worm modules operate under the guise of legitimate cloud services, complicating detection and mitigation efforts. The use of services like Cloudflare Workers allows attackers to swiftly modify their infrastructure, evading basic network defenses.

Defenses and Future Implications

Organizations are urged to scrutinize unusual processes associated with Logitech applications, monitor for unauthorized browser profile manipulations, and track spikes in outbound emails from Outlook. Deploying advanced endpoint protection that detects unauthorized screen overlays is crucial in counteracting this evolving threat.

As TCLBANKER continues to develop, its capacity for adaptation suggests a broadening scope of targets. Security professionals must remain vigilant, adopting comprehensive threat detection and response strategies to safeguard against this sophisticated malware.

Cyber Security News Tags:banking trojan, Brazil, cloud security, cyber threat, Cybersecurity, DLL side-loading, endpoint protection, Logitech, Malware, Outlook, Phishing, phishing emails, security sandbox, TCLBANKER, WhatsApp

Post navigation

Previous Post: Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
Next Post: Urgent: cPanel and WHM Security Updates Released

Related Posts

SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India SideWinder APT Hackers Attacking Indian Entities by Masquerading as the Income Tax Department of India Cyber Security News
New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER Cyber Security News
5 Actionable Tactics for SOC Analysts 5 Actionable Tactics for SOC Analysts Cyber Security News
Active Exploitation of Windows Defender Zero-Day Flaws Active Exploitation of Windows Defender Zero-Day Flaws Cyber Security News
Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst Cyber Security News
Microsoft Zero Day Quest Hacking Contest Microsoft Zero Day Quest Hacking Contest Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark